How to Wear Your Password
نویسنده
چکیده
We describe a new authentication paradigm that seeks to achieve both a desirable user experience and a high level of security. We describe a potential implementation of an identity manager in the guise of a smart bracelet. This bracelet would be equipped with a low-power processor, a Bluetooth LE transmitter, an accelerometer, and a clasp that is constructed so that opening and closing it would break and close a circuit, thereby allowing an automatic detection of when the bracelet is put on and taken off. For reasons of cost, design and error avoidance, the bracelet could be designed to not have any user interface, nor any biometric sensors: All user interaction could be assisted by third-party devices, such as user phones and point of sale terminals. Our approach is based on the principle of physical and logical tethering of an identity manager to a user (e.g., by closing the clasp), where an identity manager represents its user’s interests after an initial user authentication phase, and until the user causes a disassociation by untethering the device (e.g., by opening the clasp). The authentication phase can be based on any type of authentication, and – to allow for the greatest possible simplicity of design – can be aided by a third-party device, such as the user’s cell phone. We describe the physical design, including aspects to protect against violent attacks on users. We also describe the lightweight security protocols needed for pairing, determination of user intent, and credential management, and give examples of usage scenarios – including automated login; simplified online and point-of-sale purchases; assisted appliance personalization; and automated event logging. We then overview the protocols associated with the example usage scenarios, and discuss the security implications of our proposed design.
منابع مشابه
Benefits Enrollment Tool Access Help
Having trouble accessing the portal and its benefits enrollment tool? Whether you're a retiree without access or a CU employee who can't log in, use this page to learn how to obtain a username and a password (called an ?IdentiKey? or a ?PassportID? depending on your campus) so you may access this tool. For instructions on obtaining a username and a password, please select your campus from the o...
متن کاملP14: How to Find a Talent?
Talents may be artistic or technical, mental or physical, personal or social. You can be a talented introvert or a talented extrovert. Learning to look for your talents in the right places and building those talents into skills and abilities might take some work, but going about it creatively will let you explore your natural abilities and find your innate talents. You’re not going to fin...
متن کاملمدیر موفق کیست؟
Who is a really successful manager? A manager who spends less money, or the one who earns more? A manager who can survive for a longer period of time, or an administrator who expands his organization, and opens up new branches? Which one is the most successful? The article tries to answer these questions and provides, some simple guidlines for the managers in every domain of management who wan...
متن کاملPassword Patterns
This is a set of patterns describing how you could (maybe should) go about creating and handling your passwords in order to achieve practical security. These patterns were developed on a wiki. Also, there were some anonymous contributions. These patterns are used or at least referenced in the upcoming Security Patterns book.
متن کاملAn Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Changing your password more frequently is an easy and effective way to counter this threat and protect your personal computer and your workplace data. You should use a “strong” password of at least eight characters that includes letters, numbers, and special characters. It is also recommended that each employee changes his password this week, and remembers to change it frequently. Further infor...
متن کاملInformation Security at Union
Information security in higher education is often looked at as an oxymoron. How can we foster an open teaching and learning environment while expecting members of the community to follow rigid and archaic rules that fly in the face of being open? It turns out that information security doesn't need to be as difficult or scary as it sounds. It's not about big brother policing everything we do, it...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014